Cosc 1301 Ch 5 & 6 exam questions and
answers
_____ are the ruling bodies of countries that can pass laws that impact both the
information available via the Web and the access their citizens have to the Internet. -
Answer -Governments
Bluewood Hospital uses a connection that allows its patients and visitors to connect
their devices wirelessly to the Internet. Here, Bluewood Hospital has created a _____. -
Answer -Wi-Fi hotspot
In the accompanying figure, boxes _____ denote the transfer of an email from a
sender's mail server to a receiver's mail server. - Answer -B-D
To avoid plagiarizing Web page content, one should credit Web page sources when
they are used in papers, on Web pages, or in other documents. - Answer -True
_____ is the complete malfunction of a computer. - Answer -System failure
John has a laptop that has survived many drops over concrete and withstood extreme
temperature variations. John's laptop can be categorized as a _____. - Answer -
ruggedized device
Helen is the owner of a vintage jewelry shop. A robbery was committed in her shop.
Therefore, she decides to install closed-circuit security cameras in her shop to prevent
future robberies. Identify the technology Helen has used. - Answer -Video surveillance
_____ is a scam that redirects traffic intended for a commonly used Web site to a bogus
Web site set up by a person to obtain users' personal information. - Answer -Pharming
Which of the following is a recorded audio or video file that can be downloaded via the
Internet? - Answer -A podcast
According to the online version of the Merriam-Webster Dictionary, the term _____
means "to steal and pass off the ideas or words of another as one's own." - Answer -
plagiarize
Two of the most common ways individuals are harassed online are cyberbullying and
_____. - Answer -cyberstalking
, Unauthorized use of a Wi-Fi network is called Wi-Fi lashing, irrespective of the location
of the hacker at that time. - Answer -False
Which of the following provides leadership in addressing issues that may impact the
future of the Internet? - Answer -The Internet society
In the accompanying figure, box _____ denotes the area where the email sent by a user
is stored until the recipient opens the email. - Answer -D
Denial of service attacks today are often directed toward popular or controversial sites
and typically are carried out via multiple computers. This is known as a concentrated
denial of service attack. - Answer -False
Facebook is an example of a(n) _____. - Answer -social networking site
The best protection against many dot cons is to protect any identifying information about
oneself that could be used in fraudulent activities. - Answer -True
_________ involves maneuvering in a car with a portable device looking for unsecured
Wi-Fi networks to connect to. - Answer -War driving
Keisha decides to set up a cable Internet connection. She will require a _____ for this
cable service. - Answer -cable modem
A user has to provide a valid password to gain access to a vault in a bank. In addition to
this, the vault opens only when the user's fingerprint matches the fingerprint data stored
in the database or when a valid smartcard is swiped. The authentication method used
here is _____. - Answer -two-factor authentication
Pablo, a content writer, receives a text message, on his cellphone, containing details
about a job offer. The type of message received by Pablo is called _____. - Answer -
Short Message Service (SMS)
According to the online version of the Merriam-Webster Dictionary, the term plagiarize
means "to use another's production by crediting the source." - Answer -False
Rihanna owns a publication in New Jersey. She uses a Web-based software, Open
Journals, to manage her publication works. She often downloads many Web-based
applications needed for her work. Here, _____ are the companies that distribute Web-
based software facilities to Rihanna over the Internet. - Answer -application service
providers
Heidi wants to create a collaborative Web page that allows modification by multiple
individuals. Here, Heidi is creating a ____. - Answer -wiki
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller millyphilip. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.